Tag: mobile apps
-
New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach
Yesterday, we published a paper (that was presented at VB2016) on Android app collusions : the situation in which two or more apps work together to exfiltrate data from a device using the combined permissions of each app. Today, we publish a follow-up paper by the same (in fact, slightly larger) group of researchers, affiliated…
-
New paper: Distinguishing between malicious app collusion and benign app collaboration: a machine-learning approach
Yesterday, we published a paper (that was presented at VB2016) on Android app collusions : the situation in which two or more apps work together to exfiltrate data from a device using the combined permissions of each app. Today, we publish a follow-up paper by the same (in fact, slightly larger) group of researchers, affiliated…
-
VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…
-
VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…